Scaling up the randomized gradient-free adversarial attack reveals overestimation of robustness using established attacks.
Francesco CroceJonas RauberMatthias HeinPublished in: CoRR (2019)
Keyphrases
- countermeasures
- attack detection
- malicious users
- differential power analysis
- denial of service attacks
- power analysis
- malicious attacks
- fault injection
- ddos attacks
- cyber attacks
- dos attacks
- semi fragile watermarking
- attack scenarios
- injection attacks
- block cipher
- digital image watermarking
- digital watermark
- image watermarking scheme
- data corruption
- network intrusion
- multi agent
- network intrusions
- information leakage
- denial of service
- network anomaly detection
- watermarking scheme
- security measures
- information security
- geometric attacks
- network intrusion detection
- security vulnerabilities
- security risks
- normal traffic
- network attacks
- java card
- intrusion detection system
- edge detection
- malicious activities
- detecting malicious
- detect malicious
- defense mechanisms